default search action
Daishi Kondo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Daishi Kondo, Thomas Ansquer, Yosuke Tanigawa, Hideki Tode:
Resource Breadcrumbs: Discovering Edge Computing Resources Over Named Data Networking. IEEE Trans. Netw. Serv. Manag. 21(3): 3305-3316 (2024) - [c13]Katsuki Isobe, Jean-Philippe Eisenbarth, Daishi Kondo, Thibault Cholez, Hideki Tode:
A Deeper Grasp of Handshake: A Thorough Analysis of Blockchain-based DNS Records. BRAINS 2024: 1-10 - 2023
- [j6]Keita Hasegawa, Daishi Kondo, Masato Osumi, Hideki Tode:
Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture Attack. IEEE Trans. Netw. Serv. Manag. 20(4): 3968-3983 (2023) - [c12]Tatsuya Ueda, Daishi Kondo, Yosuke Tanigawa, Hideki Tode:
Computing Node Selection Method Based on Proactive Grasping of Computational Performance in End Cloud Environments. CCNC 2023: 672-673 - [c11]Keita Yoshitomi, Yosuke Tanigawa, Daishi Kondo, Hideki Tode:
Strictly Prioritized Multihop Transmission of High-Priority Data Composed of Multiple Frames in Wireless Sensor Networks. CCNC 2023: 893-894 - 2022
- [j5]Katsuki Isobe, Daishi Kondo, Hideki Tode:
Privacy Concerns From Single-Word Search Query Leakage From Web Browsers Through DNS. IEEE Netw. Lett. 4(1): 48-52 (2022) - [c10]Katsuki Isobe, Daishi Kondo, Hideki Tode:
A first look at the name resolution latency on handshake. IMC 2022: 756-757 - 2021
- [j4]Naotake Ishikura, Daishi Kondo, Vassilis Vassiliades, Iordan Iordanov, Hideki Tode:
DNS Tunneling Detection by Cache-Property-Aware Features. IEEE Trans. Netw. Serv. Manag. 18(2): 1203-1217 (2021) - [c9]Daishi Kondo, Thomas Ansquer, Yosuke Tanigawa, Hideki Tode:
Resource Discovery for Edge Computing over Named Data Networking. COMPSAC 2021: 552-559 - [c8]Keita Hasegawa, Daishi Kondo, Hideki Tode:
FQDN-Based Whitelist Filter on a DNS Cache Server Against the DNS Water Torture Attack. IM 2021: 628-632 - 2020
- [j3]Daishi Kondo, Vassilis Vassiliades, Thomas Silverston, Hideki Tode, Tohru Asami:
The named data networking flow filter: Towards improved security over information leakage attacks. Comput. Networks 173: 107187 (2020) - [c7]Naotake Ishikura, Daishi Kondo, Iordan Iordanov, Vassilis Vassiliades, Hideki Tode:
Cache-Property-Aware Features for DNS Tunneling Detection. ICIN 2020: 216-220 - [c6]Hideki Tode, Ashish Man Singh Pradhan, Daishi Kondo, Yosuke Tanigawa:
[Invited] NDN Based Participatory Crowdsensing Framework with Area-focused Interest Forwarding. MSN 2020: 569-575
2010 – 2019
- 2019
- [j2]Guillaume Doyen, Thibault Cholez, Wissam Mallouli, Bertrand Mathieu, Hoang Long Mai, Xavier Marchal, Daishi Kondo, Messaoud Aouadj, Alain Ploix, Edgardo Montes de Oca, Olivier Festor:
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users. IEEE Commun. Mag. 57(6): 33-39 (2019) - 2018
- [b1]Daishi Kondo:
Preventing information leakage in NDN with name and flow filters. (Prévenir la fuite d'information dans les NDN grâce aux filtres de noms et de flux). University of Lorraine, Nancy, France, 2018 - [j1]Daishi Kondo, Thomas Silverston, Vassilis Vassiliades, Hideki Tode, Tohru Asami:
Name Filter: A Countermeasure Against Information Leakage Attacks in Named Data Networking. IEEE Access 6: 65151-65170 (2018) - [c5]Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Daishi Kondo, Xavier Marchal, Thibault Cholez, Edgardo Montes de Oca, Wissam Mallouli:
Implementation of content poisoning attack detection and reaction in virtualized NDN networks. ICIN 2018: 1-3 - 2017
- [c4]Daishi Kondo, Thomas Silverston, Hideki Tode, Tohru Asami, Olivier Perrin:
Risk analysis of information-leakage through interest packets in NDN. INFOCOM Workshops 2017: 360-365 - 2016
- [c3]Daishi Kondo, Thomas Silverston, Hideki Tode, Tohru Asami, Olivier Perrin:
Name anomaly detection for ICN. LANMAN 2016: 1-6 - 2015
- [c2]Daishi Kondo, HyunYong Lee, Akihiro Nakao:
Content Piece Rarity Aware In-Network Caching for BitTorrent. GLOBECOM 2015: 1-6 - 2012
- [c1]Daishi Kondo, Akihiro Fujimoto, Yusuke Hirota, Hideki Tode, Koso Murakami:
P2P Live Streaming Distribution System with Fast Content Switching and Category-Based Recommendation Function. 3PGCIC 2012: 345-350
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint